Out-of-Bounds Read in Open Babel MOL2 File Handler
CVE-2026-2705
5.3MEDIUM
Key Information:
- Vendor
Open Babel
- Status
- Vendor
- CVE Published:
- 19 February 2026
Badges
๐พ Exploit Exists๐ก Public PoC
What is CVE-2026-2705?
A significant vulnerability exists in Open Babel's MOL2 File Handler, specifically within the OBAtom::SetFormalCharge function. This flaw allows for an out-of-bounds read, which can be exploited remotely. The issue was reported early to the Open Babel team; however, there has been no response or resolution provided to date. The exploit has now been made public, increasing the urgency for users to address this vulnerability.
Affected Version(s)
Open Babel 3.1.0
Open Babel 3.1.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Oneafter (VulDB User)
